Home | Amazing | Today | Tags | Publishers | Years | Search 
Ant Colony Optimization (Bradford Books)
Ant Colony Optimization (Bradford Books)

The complex social behaviors of ants have been much studied by science, and computer scientists are now finding that these behavior patterns can provide models for solving difficult combinatorial optimization problems. The attempt to develop algorithms inspired by one aspect of ant behavior, the ability to find what computer scientists would...

Three Paths to Profitable Investing: Using ETFs in Healthcare, Infrastructure, and the Environment to Grow Your Assets
Three Paths to Profitable Investing: Using ETFs in Healthcare, Infrastructure, and the Environment to Grow Your Assets

Discover Today’s Newest, Best Paths to Sustainable Wealth

  • Master lower-cost, lower-risk ETF investing in tomorrow’s hottest growth areas: healthcare, infrastructure, and green technology
  • Profit from demographic change and other powerful global trends
  • Learn...
Everything You Know about CSS Is Wrong!
Everything You Know about CSS Is Wrong!

Get ready to experience an eye-opening expos on CSS as you know it today. You'll discover a fresh approach to coding Cascading Style Sheets, making old hacks and workarounds a distant memory.

In this book, you'll learn how to start taking full advantage of Internet Explorer 8 using the very latest CSS techniques...

Stumbling On Wins: Two Economists Expose the Pitfalls on the Road to Victory in Professional Sports
Stumbling On Wins: Two Economists Expose the Pitfalls on the Road to Victory in Professional Sports

Don’t they want to win? Every sports fan asks that question. And no wonder! Teams have an immense amount of detailed, quantifiable information to draw upon. They have powerful incentives for making good decisions. Everyone sees the results of their choices, and the consequences for failure...

Curious Folks Ask: 162 Real Answers on Amazing Inventions, Fascinating Products, and Medical Mysteries
Curious Folks Ask: 162 Real Answers on Amazing Inventions, Fascinating Products, and Medical Mysteries

“Dr. Seethaler has written an excellent book for any interested student of science. She answers great questions about the world around us in this fascinating book. As a high school science teacher, I encounter many of these from my own students. I would highly recommend this book for anyone who has pondered...

Better Green Business: Handbook for Environmentally Responsible and Profitable Business Practices
Better Green Business: Handbook for Environmentally Responsible and Profitable Business Practices

Better Green Business brings together practical insights and start-to-finish strategies for moving any enterprise to a higher level of environmental stewardship. Drawing on his extensive experience from working across industries and functional boundaries, Dr. Eric G. Olson shows how to systematically...

Homebuyers Beware: Who's Ripping You Off Now?
Homebuyers Beware: Who's Ripping You Off Now?

Get the Best Mortgage Deal in Today’s Real Estate Markets--and Avoid a Whole New Generation of Scams! 

  • Exposes new secrets, lies, and scams the mortgage industry doesn’t want you to know about
Managing Information Security
Managing Information Security

Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth...

Overlay Networks: Toward Information Networking.
Overlay Networks: Toward Information Networking.

A recent Cisco traffic forecast indicates that annual global IP traffic will reach two-thirds of a zettabyte by 2013. With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the...

Elements of Computer Security (Undergraduate Topics in Computer Science)
Elements of Computer Security (Undergraduate Topics in Computer Science)

As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the future.

...

Holographic Data Storage: From Theory to Practical Systems
Holographic Data Storage: From Theory to Practical Systems

The modern field of nonvolatile digital information storage is a bit more than a half-century old. During its history, the field has seen a small handful of technologies (magnetic tape, magnetic hard disk, magnetic flexible disk, consumer-derived optical disk) take root as ‘mainstream’. These technologies have persisted in the...

Interconnecting Smart Objects with IP: The Next Internet
Interconnecting Smart Objects with IP: The Next Internet

Smart object technology, sometimes called the Internet of Things, is having a profound impact on our day-to-day lives. Interconnecting Smart Objects with IP is the first book that takes a holistic approach to the revolutionary area of IP-based smart objects. Smart objects are the intersection of networked embedded systems, wireless...

Result Page: 217 216 215 214 213 212 211 210 209 208 207 206 205 204 203 202 201 200 199 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy